Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Securing Apps Starts with Securing Kubernetes Mark Boddington Solutions Architect and Philippe Cloup Senior Solutions Architect When an application enters production as a container, it arrives as a changeless artifact. The first few moments of its existence are spent communicat... June 28, 2022 9:00am Deliver amazing customer experiences with data-driven, messenger-based campaigns Liam Keegan @ Intercom, Larry Geller @AWS, Sean Griffith @SimpleTexting, Travis Benson @Heap Find out how SimpleTexting uses Intercom, Heap, and AWS to accelerate discovery, execute personalised campaigns, and measure success. Join Liam Keega... 5 days ago | 57 mins Key Findings from 2022 Data Threat Report - Global Edition Eric Hanselman, Principal Research Analyst, 451 Research; Justin Lam, Research Analyst, 451 Research As the pandemic continues to affect both business and personal lives, expectations of a ‘return’ to pre-pandemic conditions have faded from most plans... 1 month ago | 58 mins 2021 OWASP Top 10: Software and Data Integrity Failures - Ep8 John Wagnon, Solutions Architect, F5 This new risk category focuses on making assumptions related to software updates, critical data, and CI/CD pipelines without verifying integrity. The ... July 21, 2022 9:00am Key Findings from 2022 Data Threat Report - Global Edition Eric Hanselman, Principal Research Analyst, 451 Research; Justin Lam, Research Analyst, 451 Research As the pandemic continues to affect both business and personal lives, expectations of a ‘return’ to pre-pandemic conditions have faded from most plans... 3 months ago | 58 mins Integrating WAF into DevSecOps Practices Andrew Cheng Senior Solutions Engineer and Patrick Zoller Security Solutions Architect The fact that application attacks are on the rise is a growing concern for business leaders, as applications are the gateway to an organisation's most... 6 days ago | 74 mins 2021 OWASP Top 10: Broken Access Control - Ep 1 John Wagnon, Solutions Architect, F5 94% of tested apps showed some form of broken access control. Failures can result in unauthorized disclosure, modification or destruction of data, pri... 1 month ago | 11 mins How Schrems II and the new SCCs impact your ability to do business in Europe Wim Stoop and Nicholas Gross Leveraging hybrid cloud for deployment and compliance Answers for balancing deployment choices and international data privacy compliance With the c... June 28, 2022 3:00pm How IR teams use market intelligence to steer companies through volatile markets IR Magazine & Morrow Sodali Amid a swirl of macroeconomic headwinds, from the war in Ukraine to red-hot inflation and fiscal tightening, equity markets look set to remain highly ... June 28, 2022 3:00pm Financial Services: Control and Governance of Personal Data Frederic Deraet As part of its digital transformation, AG2R La Mondiale, the French leader in pensions and insurance, set up an innovative urbanization architecture f... July 6, 2022 5:00pm Load more